2019
DOI: 10.1016/j.procs.2019.08.086
|View full text |Cite
|
Sign up to set email alerts
|

Securing SCADA-based Critical Infrastructures: Challenges and Open Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(25 citation statements)
references
References 25 publications
0
23
0
2
Order By: Relevance
“…In [26], Baker et al proposed identity-based cryptography and signature schemes to reinforce the integrity, security, and privacy of SCADAbased IoT CI at the fog layer. Also in [27] the open issues related to the security protection of IoT-enabled SCADA system were investigated. The authors emphasized physical, cyber, geographic, and logical CIs dependencies and interdependencies on other infrastructure (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…In [26], Baker et al proposed identity-based cryptography and signature schemes to reinforce the integrity, security, and privacy of SCADAbased IoT CI at the fog layer. Also in [27] the open issues related to the security protection of IoT-enabled SCADA system were investigated. The authors emphasized physical, cyber, geographic, and logical CIs dependencies and interdependencies on other infrastructure (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Among the other 24 papers the most common simulated attacks comprise attacks on general Internet protocols (11), command/response injection or modification (10), DoS (10) and attacks on SCADA protocols (7). The other simulated attacks were: reconnaissance (5), MITM (3), unauthorized access (1) and probing (1). Six studies present thorough specification and simulation of a number of realistic attacks, which were intended to jeopardize the particular control process [40], [43], [45], [51], [52], [56].…”
Section: B Test Environmentmentioning
confidence: 99%
“…network technologies, to present systems of the third generation that are fully networked and make use of the Internet technologies [1]. The upcoming fourth-generation SCADA systems adopt Industrial Internet of Things (IIoT) and the Future Internet (FIN) technologies such as cloud/fog computing, big data analytics, mobile computing, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs), which includes power systems, water distribution systems, gas plants, wastewater collection systems, etc. [1][2][3][4]. The stringent real-time requirements, growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of the infrastructures to various vulnerabilities and security challenges such as sabotage, terrorism and intrusions [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…the authors in [27] reviewed SCADA cyber-security risk assessment methodologies. Tariq et al [1] reviewed cyber threats and defense mechanisms for securing SCADA-based CIs. Rakas et al [16] focused on network-based solutions for SCADA intrusions.…”
Section: Introductionmentioning
confidence: 99%